SSH presides lisle security for establishing a connection and to security for transiting dus  A. True  B. False  Which of the following provides faster and more secure encryptions than TKIP for Vickers transmissions?  A. AES  B. WEP  C. NOS  D. PAP  Which encryption processional does GRE use to increase the security of is transmission?  A. SSL  B. SFTP  C. IP_sec  D. SSH  Which  protocol is accepted and used by multiple vendors?  A. SSL VPN  B. L2TP  C. SSL  D. SSH  A hacker mass a program that tries anserous character combination until it stables as the correct combination and cracks the key. What offensive strategy is this program using?  A. Bruise force attack  B. Zero-day exploit  C. CIA tried  D. Endpoint security calculability  What is the minimum acceptable key are for today\'s security standards?  A. 8 bytes  B. 128 bits  C. 258 bits  D. 512 bits  In public key encryption, which key is used to decrypt the message?  A. Session key  B. Private key  C. Public key  D. Network key  Organizations with common interests, such a regulatory requirements, performance requirements, or data access, might share resources in a.  A. Public cloud  B. Private cloud  C. Community cloud  D. Hybrid cloud  What are the two primary encryption techniques used by VPN_s today?
14)In public key encryption which key is used to decrypt the message.
 Answer:) option B is the answer that is private key
 16)what are two primary encryption techniques used by VPNS today?
 Answer:)VPNS are two primary types L2TP/IPSec nd SSL.SSl VPN connections are less commonly used but both employe a combination of symmetric and asymmetric encryption.
 Some of the commonly used protocols are:
 1)Point-to-Point Tunnelling protocol(pptp)
 2)Layer 2 Tunnelling Protocol (L2TP)
 3)Internet Protocol Security (IPSec)
 15) organisation with common interest,such as regulatory requirements and performance requirements might share resource in a ?
 Answer) option c :community cloud
 13) What is the minimum size key for todays security standards?
 Answer:) option B.128 bit